<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-jiang-sidrops-psvro-01" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.24.0 -->
  <front>
    <title abbrev="PSVRO">Route Origin Registry Problem Statement</title>
    <seriesInfo name="Internet-Draft" value="draft-jiang-sidrops-psvro-01"/>
    <author fullname="Shenglin Jiang">
      <organization>Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>jiangshl@zgclab.edu.cn</email>
      </address>
    </author>
    <author fullname="Ke Xu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>xuke@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Qi Li">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>qli01@tsinghua.edu.cn</email>
      </address>
    </author>
    <author fullname="Xingang Shi">
      <organization>Tsinghua University &amp; Zhongguancun Laboratory</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>shixg@cernet.edu.cn</email>
      </address>
    </author>
    <author fullname="Zhuotao Liu">
      <organization>Tsinghua University</organization>
      <address>
        <postal>
          <city>Beijing</city>
          <country>China</country>
        </postal>
        <email>zhuotaoliu@tsinghua.edu.cn</email>
      </address>
    </author>
    <date year="2024" month="November" day="25"/>
    <workgroup>SIDROPS</workgroup>
    <abstract>
      <?line 106?>

<t>Prefix hijacking, i.e., unauthorized announcement of a prefix, has emerged as a major security threat in the Border Gateway Protocol (BGP), garnering widespread attention. To migrate such attacks while supporting legitimate  Multiple Origin ASes (MOAS), higher requirements are placed on the route origin registry. This document serves to outline the problem statement for current route origin registry.</t>
    </abstract>
  </front>
  <middle>
    <?line 110?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Border Gateway Protocol (BGP) is ubiquitously used for inter-domain routing. However, it lacks built-in security validation on whether its UPDATE information is legitimate <xref target="RFC4272"/>. This poses concerns regarding prefix hijacking, where unauthorized announcements of prefixes can occur, simulating legitimate Multiple Origin ASes (MOAS).</t>
      <t>Unfortunately, the current route origin registry, such as Internet Routing Registry (IRR) <xref target="RFC1786"/> and Resource Public Key Infrastructure (RPKI) <xref target="RFC6480"/>, are not effective in distinguishing between legitimate MOAS and prefix hijacking. There is a pressing need for an verifiable route origin registry that can support registration and protection of legitimate MOAS, thereby mitigating the threats posed by prefix hijacking to the routing system.</t>
      <t>This document will primarily analyze the various scenarios of MOAS and highlight the limitations of the current route origin registry. By examining these issues, our primary objective is to offer valuable insights to network operators, researchers, and policymakers for improving the security and robustness of the global routing system.</t>
    </section>
    <section anchor="requirements-language">
      <name>Requirements Language</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="working-definition-of-route-origin-registry">
      <name>Working Definition of Route Origin Registry</name>
      <t>Route origin registry refers to a system that records the mapping of IP prefixes to the ASes authorised to announce them. Resource holders can register route origin mapping relationships in route origin registry by themselves or delegate to others.</t>
      <t>IRR and RPKI currently offer functionalities related to route origin registry. IRRs, which have been in operation since 1995, serve as a globally distributed database for routing information. They record the binding relationship between IPs and Autonomous Systems (ASes) via Route(6) objects, which are defined by the Routing Policy Specification Language (RPSL).</t>
      <t>On the other hand, the RPKI, which was developed starting in 2008, provides a formally verifiable framework. The RPKI is based on resource certificates that extend the X.509 standard. It records the mapping between IP prefixes and their authorised ASes via Route Origin Authorization (ROA) objects. These ROA objects contain essential information such as the prefix, origin ASN, and MaxLength.</t>
    </section>
    <section anchor="prefix-hijacking-and-legitimate-moas">
      <name>Prefix Hijacking and Legitimate MOAS</name>
      <t><xref target="RFC1930"/> suggests that a prefix should typically have a single Autonomous System (AS) as its origin, with a few exceptions. However, CAIDA's analysis on BGP routing data <xref target="CAIDA"/> reveals that MOAS have become a common phenomenon. There are various reasons that contribute to the emergence of MOAS prefixes:</t>
      <ul spacing="normal">
        <li>
          <t><strong><em>Aggregation</em></strong>. According to <xref target="RFC1930"/>, aggregation could result in prefix originated from multiple possible ASes. For example, if the "Prefix 0/24" originates from ASx and the "Prefix 1/24" originates from ASy, aggregating them into "Prefix 0/23" with the originates from [ASx, ASy] may result in the loss of the specific origin AS information if the ATOMIC_AGGREGATE attributes of the aggregation announcements are not specific.</t>
        </li>
        <li>
          <t><strong><em>Business consideration</em></strong>. Companies often choose providers that offer high-speed and reliable data services to host their servers. For efficient resource allocation, a parent organization that owns a large chunk of IP addresses may divide its address space among one or more child organizations, which choose different providers and ask them to announce the same prefix. For example, a multi-national company may advertise its prefix from multiple locations where it has offices.</t>
        </li>
        <li>
          <t><strong><em>Multi-homing</em></strong>. When multi-homing occur without the use of BGP, it can result in MOAS conflicts. Assuming ASx is connected to two providers, ISP1 and ISP2. ISP1 is connected to ASx using BGP, while ISP2 is connected to ASx through static routes or Interior Gateway Protocol (IGP). Both ISP1 and ISP2 advertise prefixes that belong to ASx.</t>
        </li>
        <li>
          <t><strong><em>Internet eXchanges</em></strong>. When a prefix is associated with an exchange point, it becomes directly accessible from all the ASes connected to that exchange point. Each AS at the exchange point has the capability to advertise the prefix as if it originates directly from their own AS.</t>
        </li>
        <li>
          <t><strong><em>Anycast</em></strong>. Anycast is often employed by content distribution networks (CDNs) to direct the requests of their customers to the nearest servers, ensuring speedy data delivery to their customers.</t>
        </li>
        <li>
          <t><strong><em>Prefix hijacking and misconfigurations</em></strong>. A malicious AS may advertise prefixes belonging to another organization to attract its traffic. An AS may also make such annoucements unintentionally due to misconfiguration.</t>
        </li>
      </ul>
      <t>Distinguishing between prefix hijacking, misconfiguration, and legitimate MOAS can be a complex task. The challenge arises from the resemblance of these behaviors, as they often display similar characteristics. Moreover, accurately identifying and classifying these situations necessitates a route origin registry with high coverage and accuracy.</t>
    </section>
    <section anchor="problems-in-current-route-origin-registry">
      <name>Problems in Current Route Origin Registry</name>
      <t>This section outlines several challenges faced by the current route origin registration mechanisms in distinguishing legitimate MOAS events from malicious MOAS incidents, such as route hijacking.</t>
      <section anchor="security-risks-from-partial-adoption">
        <name>Security Risks from Partial Adoption</name>
        <t>As the adoption of RPKI continues to grow, the number of address prefixes registered within RPKI is gradually increasing. However, recent reports from the Number Resource Organization (NRO) <xref target="NRO"/> indicate that the coverage of IP prefixes within ROAs is still relatively low, and the adoption rate of route origin validation (ROV), as measured by Mutually Agreed Norms for Routing Security (MANRS) <xref target="MANRS"/>, is even significantly lower than the coverage of ROAs. Similarly, <xref target="IRRegularities"/> also notes a decreasing trend in IP Prefix coverage in certain IRRs. When focusing on MOAS (Multiple Origin AS), their coverage is significantly lower and insufficient to distinguish between legitimate MOAS and route hijacking.</t>
        <t>Limited IP prefix coverage within the current route origin registry, especially for MOAS prefixes, hinders the complete validation of route announcements, significantly limiting the motivation for network operators to utilize route origin registry.</t>
      </section>
      <section anchor="inconsistency-between-different-route-origin-registries">
        <name>Inconsistency between Different Route Origin Registries</name>
        <t>Based on the analysis presented in the previous sections, it is evident that relying solely on a single source of route origin registry is insufficient in route origin validation. To address this issue effectively, it is recommended to integrate the RPKI and multiple active IRRs.</t>
        <t>However, it is important to note that this fusion approach may encounter several limitations. As highlighted in <xref target="IRRegularities"/>, inconsistencies exist among the Route(6) objects across different IRRs. This inconsistency can be attributed to the chronic neglect by IRR customers. For instance, some companies may register Route(6) objects in some IRRs but fail to update them in all the route origin registries, resulting in outdated and stale Route(6) objects. Furthermore, it is observed that a higher number of IRRs exhibit lower consistency with RPKI. In practice, different networks often use different data and methodologies to perform route validation and filtering, resulting in disparate outcome, especially when ROA and IRR data conflict with each other.</t>
        <t>As a result, while integrating the RPKI and multiple active IRRs can improve the effectiveness of route origin validation, it is essential to address the issues of inconsistencies between different route origin registries.</t>
      </section>
      <section anchor="insufficiency-of-resource-certification">
        <name>Insufficiency of Resource Certification</name>
        <t>As mentioned in <xref target="RFC7682"/>, the lack of certification and incentives for maintaining up-to-date data within IRRs leads to low accuracy of the information. Recent measurement <xref target="IRRegularities"/> reveals that IRRs with low update activity exhibit lower overlap with BGP announcements than those with high update activity. This indicates that IRRs with lower activity may contain a higher proportion of outdated and stale Route(6) objects, thereby impacting the reliability of the route origin registry.</t>
        <t>RPKI is a hierarchical Public Key Infrastructure (PKI) that binds Internet Number Resources (INRs) such as Autonomous System Numbers (ASNs) and IP addresses to public keys via certificates. However, there is a risk of conflicts in INRs ownership when misconfiguration or malicious operations occur at the upper tier, resulting in multiple lower tiers being allocated the same INRs. Additionally, the existence of legitimate MOAS necessitates the authorization of binding between a prefix with multiple ASes, further complicating the issue. Balancing the protection of legitimate MOAS while minimizing risks in INRs certificates presents a challenging problem that requires innovative solutions. Furthermore, it is worth noting that RPKI Relying Parties (RPs) <xref target="RFC8897"/> have not yet standardized the process of constructing certificate chains and handling exceptions such as Certificate Revocation Lists (CRLs) and Manifests. This lack of standardization has resulted in different views on the RPKI records by RPs who adopt different implementations. Consequently, ASes served by different RPs may have varying validation results for the same route announcement.</t>
        <t>Consequently, the absence of data validation and standardization in operations within the IRR or RPKI framework means that there is no guarantee of the accuracy of the data registered in any route origin registry.</t>
      </section>
      <section anchor="synchronization-and-management">
        <name>Synchronization and Management</name>
        <t>The current practice in IRRs involves the use of the Near-Real-Time Mirroring (NRTM) protocol <xref target="NRTMv4"/> to replicate and synchronize Route(6) object from other IRRs. Similarly, the RPKI relies on the RPKI Repository Delta Protocol (RRDP) <xref target="RFC8182"/> to synchronize and update data. However, these network protocols exhibit several weaknesses that need to be addressed.</t>
        <ul spacing="normal">
          <li>
            <t>The absence of a mechanism to notify other mirrors when updates occur results in synchronization delays and data inconsistency issues. This can be problematic when timeliness and accuracy are crucial.</t>
          </li>
          <li>
            <t>The absence of validation for replicated data from mirrored sources in both IRRs and RPKI is a legitimate concern. This situation creates a considerable risk for inconsistencies and conflicts with the current data.</t>
          </li>
          <li>
            <t>The absence of application security mechanisms within these protocols is another area of vulnerability. This lack of security measures exposes the system to unauthorized access and compromise on data integrity.</t>
          </li>
        </ul>
        <t>Although some approaches attempt to optimise the quality of the route origin registry, e.g. RIPE NCC, IRRdv4 using RPKI to validate/filter IRR Route(6) objects, and <xref target="RFC8416"/> proposing that RPs can customise route origin with local data, the problem of inconsistency persists due to the limited coverage of RPKI and the lack of effective mechanisms to resolve conflicting data between IRRs. It is crucial to establish a effective communication mechanism among multiple route origin registry, enabling negotiation and cross-validation of conflicting or special-purpose route origin information.</t>
      </section>
      <section anchor="summary">
        <name>Summary</name>
        <t>The current route origin registry systems, namely IRRs and RPKI, are facing challenges as the increased occurrence of MOAS prefixes. These challenges mainly include low adoption rates, global inconsistency, insufficient resource certification, and incomplete multi-source collaboration mechanisms.</t>
      </section>
    </section>
    <section anchor="requirements-for-new-route-origin-registry-mechanisms">
      <name>Requirements for New Route Origin Registry Mechanisms</name>
      <t>This section lists the requirements designed to guide the improvement of current route origin registry mechanisms. These enhancements should prioritize multi-party collaboration to safeguard legitimate MOAS events while effectively filtering out malicious MOAS incidents.</t>
      <section anchor="allowlist-mechanism">
        <name>Allowlist Mechanism</name>
        <t>To ensure robust protection for legitimate MOAS events, prefix users should implement an allowlist mechanism as a complementary to the current resource-owner-centric systems. This mechanism permits multiple users to be authorized to announce the same  prefix concurrently. Moreover, users should be able to dynamically join or leave the allowlist based on practical business consideration.</t>
      </section>
      <section anchor="blocklist-mechanism">
        <name>Blocklist Mechanism</name>
        <t>One of the primary objectives of route origin validation is to suppress the propagation of malicious MOAS incidents and mitigate their impact. To enhance the efficiency and precision of anomaly detection, network participants should employ real-time anomaly monitoring and rapid consensus mechanisms to construct a blocklist. This blocklist enables the timely de-prioritization of anomalous routes, thereby reducing their disruptive effects on the routing system.</t>
      </section>
      <section anchor="multi-party-governance">
        <name>Multi-party Governance</name>
        <t>Multi-party governance plays a pivotal role in the development of new route origin mechanisms. By integrating and cross-verifying data from multiple sources, this approach facilitates effective negotiation and resolution of data duplication and conflicts. It ensures the full utilization of the strengths of each data source, thereby enhancing the reliability and functionality of the system.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>There is no security consideration in this draft.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>There is no IANA consideration in this draft.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC1786">
          <front>
            <title>Representation of IP Routing Policies in a Routing Registry (ripe-81++)</title>
            <author fullname="T. Bates" initials="T." surname="Bates"/>
            <author fullname="E. Gerich" initials="E." surname="Gerich"/>
            <author fullname="L. Joncheray" initials="L." surname="Joncheray"/>
            <author fullname="J-M. Jouanigot" surname="J-M. Jouanigot"/>
            <author fullname="D. Karrenberg" initials="D." surname="Karrenberg"/>
            <author fullname="M. Terpstra" initials="M." surname="Terpstra"/>
            <author fullname="J. Yu" initials="J." surname="Yu"/>
            <date month="March" year="1995"/>
            <abstract>
              <t>This document is an update to the original `ripe-81' proposal for representing and storing routing polices within the RIPE database. It incorporates several extensions proposed by Merit Inc. and gives details of a generalized IP routing policy representation to be used by all Internet routing registries. It acts as both tutorial and provides details of database objects and attributes that use and make up a routing registry. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1786"/>
          <seriesInfo name="DOI" value="10.17487/RFC1786"/>
        </reference>
        <reference anchor="RFC8182">
          <front>
            <title>The RPKI Repository Delta Protocol (RRDP)</title>
            <author fullname="T. Bruijnzeels" initials="T." surname="Bruijnzeels"/>
            <author fullname="O. Muravskiy" initials="O." surname="Muravskiy"/>
            <author fullname="B. Weber" initials="B." surname="Weber"/>
            <author fullname="R. Austein" initials="R." surname="Austein"/>
            <date month="July" year="2017"/>
            <abstract>
              <t>In the Resource Public Key Infrastructure (RPKI), Certificate Authorities (CAs) publish certificates, including end-entity certificates, Certificate Revocation Lists (CRLs), and RPKI signed objects to repositories. Relying Parties retrieve the published information from those repositories. This document specifies a new RPKI Repository Delta Protocol (RRDP) for this purpose. RRDP was specifically designed for scaling. It relies on an Update Notification File which lists the current Snapshot and Delta Files that can be retrieved using HTTPS (HTTP over Transport Layer Security (TLS)), and it enables the use of Content Distribution Networks (CDNs) or other caching infrastructures for the retrieval of these files.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8182"/>
          <seriesInfo name="DOI" value="10.17487/RFC8182"/>
        </reference>
        <reference anchor="RFC6480">
          <front>
            <title>An Infrastructure to Support Secure Internet Routing</title>
            <author fullname="M. Lepinski" initials="M." surname="Lepinski"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document describes an architecture for an infrastructure to support improved security of Internet routing. The foundation of this architecture is a Resource Public Key Infrastructure (RPKI) that represents the allocation hierarchy of IP address space and Autonomous System (AS) numbers; and a distributed repository system for storing and disseminating the data objects that comprise the RPKI, as well as other signed objects necessary for improved routing security. As an initial application of this architecture, the document describes how a legitimate holder of IP address space can explicitly and verifiably authorize one or more ASes to originate routes to that address space. Such verifiable authorizations could be used, for example, to more securely construct BGP route filters. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6480"/>
          <seriesInfo name="DOI" value="10.17487/RFC6480"/>
        </reference>
        <reference anchor="RFC8416">
          <front>
            <title>Simplified Local Internet Number Resource Management with the RPKI (SLURM)</title>
            <author fullname="D. Ma" initials="D." surname="Ma"/>
            <author fullname="D. Mandelberg" initials="D." surname="Mandelberg"/>
            <author fullname="T. Bruijnzeels" initials="T." surname="Bruijnzeels"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>The Resource Public Key Infrastructure (RPKI) is a global authorization infrastructure that allows the holder of Internet Number Resources (INRs) to make verifiable statements about those resources. Network operators, e.g., Internet Service Providers (ISPs), can use the RPKI to validate BGP route origin assertions. ISPs can also use the RPKI to validate the path of a BGP route. However, ISPs may want to establish a local view of exceptions to the RPKI data in the form of local filters and additions. The mechanisms described in this document provide a simple way to enable INR holders to establish a local, customized view of the RPKI, overriding global RPKI repository data as needed.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8416"/>
          <seriesInfo name="DOI" value="10.17487/RFC8416"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC4272">
          <front>
            <title>BGP Security Vulnerabilities Analysis</title>
            <author fullname="S. Murphy" initials="S." surname="Murphy"/>
            <date month="January" year="2006"/>
            <abstract>
              <t>Border Gateway Protocol 4 (BGP-4), along with a host of other infrastructure protocols designed before the Internet environment became perilous, was originally designed with little consideration for protection of the information it carries. There are no mechanisms internal to BGP that protect against attacks that modify, delete, forge, or replay data, any of which has the potential to disrupt overall network routing behavior.</t>
              <t>This document discusses some of the security issues with BGP routing data dissemination. This document does not discuss security issues with forwarding of packets. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4272"/>
          <seriesInfo name="DOI" value="10.17487/RFC4272"/>
        </reference>
        <reference anchor="RFC1930">
          <front>
            <title>Guidelines for creation, selection, and registration of an Autonomous System (AS)</title>
            <author fullname="J. Hawkinson" initials="J." surname="Hawkinson"/>
            <author fullname="T. Bates" initials="T." surname="Bates"/>
            <date month="March" year="1996"/>
            <abstract>
              <t>This memo discusses when it is appropriate to register and utilize an Autonomous System (AS), and lists criteria for such. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="6"/>
          <seriesInfo name="RFC" value="1930"/>
          <seriesInfo name="DOI" value="10.17487/RFC1930"/>
        </reference>
        <reference anchor="RFC7682">
          <front>
            <title>Considerations for Internet Routing Registries (IRRs) and Routing Policy Configuration</title>
            <author fullname="D. McPherson" initials="D." surname="McPherson"/>
            <author fullname="S. Amante" initials="S." surname="Amante"/>
            <author fullname="E. Osterweil" initials="E." surname="Osterweil"/>
            <author fullname="L. Blunk" initials="L." surname="Blunk"/>
            <author fullname="D. Mitchell" initials="D." surname="Mitchell"/>
            <date month="December" year="2015"/>
            <abstract>
              <t>The purpose of this document is to catalog issues that influenced the efficacy of Internet Routing Registries (IRRs) for inter-domain routing policy specification and application in the global routing system over the past two decades. Additionally, it provides a discussion regarding which of these issues are still problematic in practice, and which are simply artifacts that are no longer applicable but continue to stifle inter-provider policy-based filtering adoption and IRR utility to this day.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7682"/>
          <seriesInfo name="DOI" value="10.17487/RFC7682"/>
        </reference>
        <reference anchor="RFC8897">
          <front>
            <title>Requirements for Resource Public Key Infrastructure (RPKI) Relying Parties</title>
            <author fullname="D. Ma" initials="D." surname="Ma"/>
            <author fullname="S. Kent" initials="S." surname="Kent"/>
            <date month="September" year="2020"/>
            <abstract>
              <t>This document provides a single reference point for requirements for Relying Party (RP) software for use in the Resource Public Key Infrastructure (RPKI). It cites requirements that appear in several RPKI RFCs, making it easier for implementers to become aware of these requirements. Over time, this RFC will be updated to reflect changes to the requirements and guidance specified in the RFCs discussed herein.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8897"/>
          <seriesInfo name="DOI" value="10.17487/RFC8897"/>
        </reference>
        <reference anchor="NRTMv4">
          <front>
            <title>Near Real Time Mirroring (NRTM) version 4</title>
            <author fullname="Sasha Romijn" initials="S." surname="Romijn">
              <organization>Reliably Coded</organization>
            </author>
            <author fullname="Job Snijders" initials="J." surname="Snijders">
              <organization>Fastly</organization>
            </author>
            <author fullname="Edward Shryane" initials="E." surname="Shryane">
              <organization>RIPE NCC</organization>
            </author>
            <author fullname="Stavros Konstantaras" initials="S." surname="Konstantaras">
              <organization>AMS-IX</organization>
            </author>
            <date day="13" month="November" year="2024"/>
            <abstract>
              <t>   This document specifies a one-way synchronization protocol for
   Internet Routing Registry (IRR) records.  The protocol allows
   instances of IRR database servers to mirror IRR records, specified in
   the Routing Policy Specification Language (RPSL), between each other.


              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-grow-nrtm-v4-05"/>
        </reference>
        <reference anchor="IRRegularities">
          <front>
            <title>IRRegularities in the internet routing registry</title>
            <author initials="B." surname="Du">
              <organization/>
            </author>
            <author initials="K." surname="Izhikevich">
              <organization/>
            </author>
            <author initials="S." surname="Rao">
              <organization/>
            </author>
            <author initials="G." surname="Akiwate">
              <organization/>
            </author>
            <author initials="C." surname="Testart">
              <organization/>
            </author>
            <author initials="" surname="AC Snoeren">
              <organization/>
            </author>
            <author initials="K." surname="Claffy">
              <organization/>
            </author>
            <date year="2023"/>
          </front>
          <seriesInfo name="Proceedings of the 2023 ACM on internet measurement conference" value=""/>
        </reference>
        <reference anchor="CAIDA" target="https://catalog.caida.org/dataset/routeviews_prefix2as">
          <front>
            <title>RouteViews Prefix to AS mappings</title>
            <author>
              <organization/>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="MANRS" target="https://observatory.manrs.org/">
          <front>
            <title>MANRS Observatory</title>
            <author>
              <organization/>
            </author>
            <date year="2024"/>
          </front>
        </reference>
        <reference anchor="NRO" target="https://www.nro.net/about/rirs/statistics/">
          <front>
            <title>RIR Statistics</title>
            <author>
              <organization/>
            </author>
            <date year="2024"/>
          </front>
        </reference>
      </references>
    </references>
    <?line 232?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank Yangfei Guo, Di Ma, Qi Li, Shuhe Wang, Xiaoliang Wang, Hui Wang, etc. for their valuable comments on this document.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
